CVE-2025-1924
Awaiting Analysis Awaiting Analysis - Queue
Denial of Service and Code Execution in Yokogawa Vnet/IP Interface

Publication date: 2026-02-13

Last updated on: 2026-03-02

Assigner: YokogawaGroup

Description
A vulnerability has been found in Vnet/IP Interface Package provided by Yokogawa Electric Corporation. If affected product receive maliciously crafted packets, a DoS attack may cause Vnet/IP communication functions to stop or arbitrary programs to be executed. The affected products and versions are as follows: Vnet/IP Interface Package (for CENTUM VP R6 VP6C3300, CENTUM VP R7 VP7C3300) R1.07.00 or earlier
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-02-13
Last Modified
2026-03-02
Generated
2026-05-07
AI Q&A
2026-02-13
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
yokogawa vnet/ip_interface_package to r1.08.00 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-787 The product writes data past the end, or before the beginning, of the intended buffer.
CWE-191 The product subtracts one value from another, such that the result is less than the minimum allowable integer value, which produces a value that is not equal to the correct result.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

The CVE-2025-1924 vulnerability affects the Vnet/IP Interface Package provided by Yokogawa Electric Corporation, specifically versions R1.07.00 or earlier used in CENTUM VP R6 and R7 systems. It is caused by an out-of-bounds write and integer underflow, which occur when the affected product receives maliciously crafted packets.

This vulnerability can lead to a Denial of Service (DoS) by stopping Vnet/IP communication functions or potentially allow arbitrary program execution, meaning an attacker could disrupt communication or run unauthorized code on the system.


How can this vulnerability impact me? :

If exploited, this vulnerability can cause the Vnet/IP communication functions to stop, resulting in a Denial of Service (DoS) which disrupts normal operations of the affected systems.

Additionally, it may allow an attacker to execute arbitrary programs, potentially compromising system integrity and security.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

I don't know


What immediate steps should I take to mitigate this vulnerability?

To mitigate the CVE-2025-1924 vulnerability, you should apply the fixed version R1.08.00 of the Vnet/IP Interface Package provided by Yokogawa Electric Corporation.

Yokogawa recommends performing a risk assessment based on your individual system environment before applying the patch.

Additionally, you may contact Yokogawa for support in implementing the countermeasures.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart